Explore PETRAS's research knowledge base of peer reviewed, multidisciplinary publications.
401. Knowles, Brandin Hanson; Beck, Sophie; Finney, Joe; Devine, James; Lindley, Joseph Galen: A Scenario-Based Methodology for Exploring Risks: Children and Programmable IoT. In: DIS '19: Proceedings of the 2019 on Designing Interactive Systems Conference, ACM, 0000. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-knowles_scenario_2019,
title = {A Scenario-Based Methodology for Exploring Risks: Children and Programmable IoT},
author = {Brandin Hanson Knowles and Sophie Beck and Joe Finney and James Devine and Joseph Galen Lindley},
url = {https://doi.org/10.1145%2F3322276.3322315},
doi = {10.1145/3322276.3322315},
booktitle = {DIS '19: Proceedings of the 2019 on Designing Interactive Systems Conference},
publisher = {ACM},
abstract = {In this paper we report on research exploring the privacy, security and safety implications of children being able to program Internet of Things devices. We present our methodology for understanding the contexts in which children may wish to use programmable IoT, identifying risks that emerge in such contexts, and creating a set of questions that might guide design of such technologies so that they are safe for child users. We evaluate the success of the methodology, discuss the limitations of the approach, and describe future work.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
402. Tanczer, Leonie Maria; Carr, Madeline; Brass, Irina; Steenmans, Ine; Blackstock, Jason J.: IoT and Its Implications for Informed Consent. 0000. (Type: report | Abstract | Links | BibTeX | Altmetric) @report{art-tanczer_iot_2017,
title = {IoT and Its Implications for Informed Consent},
author = {Leonie Maria Tanczer and Madeline Carr and Irina Brass and Ine Steenmans and Jason J. Blackstock},
url = {https://doi.org/10.2139%2Fssrn.3117293},
doi = {10.2139/ssrn.3117293},
publisher = {Elsevier BV},
institution = {PETRAS IoT Hub, STEaPP},
abstract = {This report is based on a three-hour long workshop between representatives of the PETRAS IoT Hub, Pinsent Masons, and the HMG Department for Transport. The workshop is part of an ongoing investigation that explores the connections between some of the different dimensions likely to shape conceptions and applications of consent in the emerging Internet of Things (IoT). The impetus for the workshop was the recognition that two significant developments will challenge conventional approaches to online consent. From a technical perspective, the IoT will significantly increase personal data collection, use and re-use. From a regulatory perspective, the General Data Protection Regulation (GDPR) which comes into force in May 2018, will make much higher demands on practices of giving and obtaining consent. Combined, these two factors suggest that consent will be a major issue for all actors in the next five years and it requires some careful analysis now in order to adequately prepare for these developments.},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
403. Aldrich, Richard J.: Intelligence. In: Williams, Paul D.; McDonald, Matt (Ed.): Security Studies: An Introduction, Routledge, Abingdon, Oxon New York, NY, 0000, ISBN: 9780415784900. (Type: Book Section | Abstract | Links | BibTeX) @incollection{col-in-aldrich_intelligence_2018,
title = {Intelligence},
author = {Richard J. Aldrich},
editor = {Paul D. Williams and Matt McDonald},
url = {https://www.routledge.com/Security-Studies-An-Introduction/Williams-McDonald/p/book/9780415784900},
isbn = {9780415784900},
booktitle = {Security Studies: An Introduction},
publisher = {Routledge},
address = {Abingdon, Oxon New York, NY},
edition = {3},
chapter = {29},
abstract = {Security Studies: An Introduction, 3rd edition, is the most comprehensive textbook available on the subject, providing students with an essential grounding in the debates, frameworks, and issues on the contemporary security agenda.
This new edition has been comprehensively revised and updated, with new chapters added on poststructuralism, postcolonialism, securitization, peace and violence, development, women, peace and security, cybersecurity, and outer space.
Divided into four parts, the text provides students with a detailed, accessible overview of the major theoretical approaches, key themes, and most significant issues within security studies.
Part 1 explores the main theoretical approaches from both traditional and critical standpoints
Part 2 explains the central concepts underpinning contemporary debates
Part 3 presents an overview of the institutional security architecture
Part 4 examines some of the key contemporary challenges to global security
Collecting these related strands into a single textbook creates a valuable teaching tool and a comprehensive, accessible learning resource for undergraduates and MA students.},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
This new edition has been comprehensively revised and updated, with new chapters added on poststructuralism, postcolonialism, securitization, peace and violence, development, women, peace and security, cybersecurity, and outer space.
Divided into four parts, the text provides students with a detailed, accessible overview of the major theoretical approaches, key themes, and most significant issues within security studies.
Part 1 explores the main theoretical approaches from both traditional and critical standpoints
Part 2 explains the central concepts underpinning contemporary debates
Part 3 presents an overview of the institutional security architecture
Part 4 examines some of the key contemporary challenges to global security
Collecting these related strands into a single textbook creates a valuable teaching tool and a comprehensive, accessible learning resource for undergraduates and MA students.404. Binns, Reuben Daniel: Fairness in Machine Learning: Lessons from Political Philosophy. In: Friedler, Sorelle A.; Wilson, Christo (Ed.): Proceedings of the 1st Conference on Fairness, Accountability and Transparency, pp. 149–159, PMLR, 0000. (Type: Proceedings Article | Abstract | Links | BibTeX) @inproceedings{proc-in-binns_fairness_2018,
title = {Fairness in Machine Learning: Lessons from Political Philosophy},
author = {Reuben Daniel Binns},
editor = {Sorelle A. Friedler and Christo Wilson},
url = {https://proceedings.mlr.press/v81/binns18a.html},
booktitle = {Proceedings of the 1st Conference on Fairness, Accountability and Transparency},
volume = {81},
pages = {149--159},
publisher = {PMLR},
series = {Proceedings of Machine Learning Research},
abstract = {What does it mean for a machine learning model to be 'fair', in terms which can be operationalised? Should fairness consist of ensuring everyone has an equal probability of obtaining some benefit, or should we aim instead to minimise the harms to the least advantaged? Can the relevant ideal be determined by reference to some alternative state of affairs in which a particular social pattern of discrimination does not exist? Various definitions proposed in recent literature make different assumptions about what terms like discrimination and fairness mean and how they can be defined in mathematical terms. Questions of discrimination, egalitarianism and justice are of significant interest to moral and political philosophers, who have expended significant efforts in formalising and defending these central concepts. It is therefore unsurprising that attempts to formalise 'fairness' in machine learning contain echoes of these old philosophical debates. This paper draws on existing work in moral and political philosophy in order to elucidate emerging debates about fair machine learning.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
405. Smart, Paul R.; Madaan, Aastha: The Social Scaffolding of Machine Intelligence. In: vol. 10, no. 3--4, pp. 261–279, 0000, ISSN: 1942-2679. (Type: Journal Article | Abstract | BibTeX) @article{art-smart_social_2017,
title = {The Social Scaffolding of Machine Intelligence},
author = {Paul R. Smart and Aastha Madaan},
issn = {1942-2679},
volume = {10},
number = {3--4},
pages = {261--279},
abstract = {The Internet provides access to a global space of information assets and computational services. It also, however, serves as a platform for social interaction (e.g., Facebook) and participatory involvement in all manner of online asks and activities (e.g., Wikipedia). There is a sense, therefore, that the Internet yields an unprecedented form of access to the human social environment: it provides insight into the dynamics of human behavior (both individual and collective), and it additionally provides access to the digital products of human cognitive labor (again, both individual and collective). Such access is interesting from the standpoint of research into machine intelligence, for the human social environment looks to be of crucial importance when it comes to the evolutionary and developmental origins of the human mind. In the present paper, we develop a theoretical account that sees the Internet as providing opportunities for online systems to function as socially-situated agents. The result is a vision of machine intelligence in which advanced forms of cognitive competence are seen to arise from the creation of a new kind of digital socio-ecological niche. The present paper attempts to detail this vision with respect to the notion of socially-scaffolded cognition. It also describes some of the forms of machine learning that may be required to enable online systems to press maximal cognitive benefit from their new-found informational contact with the human social world.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
406. Shipworth, David: Peer-to-Peer Energy Trading Using Blockchains — Part 1: Peer-to-peer in the Energy Transition. In: 0000. (Type: Journal Article | Links | BibTeX) @article{art-shipworth_peer_2017,
title = {Peer-to-Peer Energy Trading Using Blockchains \textemdash Part 1: Peer-to-peer in the Energy Transition},
author = {David Shipworth},
url = {http://www.ieadsm.org/wp/files/IEA-DSM-Spotlight-Issue67-December2017.pdf},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
407. Shipworth, David: Peer-to-Peer Energy Trading Using Blockchains — Part 2: Risks, Challenges, and Areas of Research Focus. In: 0000. (Type: Journal Article | Links | BibTeX) @article{art-shipworth_peer_2018,
title = {Peer-to-Peer Energy Trading Using Blockchains \textemdash Part 2: Risks, Challenges, and Areas of Research Focus},
author = {David Shipworth},
url = {http://www.ieadsm.org/wp/files/IEA-DSM-Spotlight-Issue68-March2018.pdf},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
408. Brass, Irina; Tanczer, Leonie Maria; Carr, Madeline; Blackstock, Jason J.: Regulating IoT: Enabling or Disabling the Capacity of the Internet of Things?. In: 0000. (Type: Journal Article | Abstract | Links | BibTeX) @article{art-brass_regulating_2017,
title = {Regulating IoT: Enabling or Disabling the Capacity of the Internet of Things?},
author = {Irina Brass and Leonie Maria Tanczer and Madeline Carr and Jason J. Blackstock},
url = {https://core.ac.uk/download/pdf/81675775.pdf},
abstract = {The Internet of Things (IoT) is the technology buzzword of the day. The number of networkconnected devices has now exceeded the world population, and recent market research estimates that 8.4 billion connected 'things' will be in use in 2017. IoT technologies add an online identity to objects that have traditionally had only a physical identity - from fridges, to cars to power plants - enabling these objects to be virtually sensed, analysed and even actuated.
Governments around the world realise the socio-economic potential of IoT, and are eagerly exploring how their economies might harness the benefits from live data flows and customisation across sectors as diverse as healthcare, manufacturing, infrastructure management and utilities.
In 2015, the UK Government set its aspiration to become "a world leader in the development and implementation of the Internet of Things." However, it also acknowledged that IoT raises unique challenges to data protection and the security of information systems and networks. These concerns are hardly unique to the UK. Connected 'things' are being manufactured and traded around the world. In most cases today, devices are built with extremely limited security specifications designed into their hardware or software, raising significant concerns about the security of rapidly expanding IoT networks.
Below we explore the regulatory approaches emerging in the EU and US in response to the security and privacy challenges of IoT. We find that the preference has, thus far at least, been for light touch regulation, though American and European approaches might soon diverge. Regardless, in order to effectively manage risks and enable societal and economic benefits, we argue governments like the UK need to develop new institutional coordination models that can enable a broad 'culture of security' for IoT across public and private sectors alike.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Governments around the world realise the socio-economic potential of IoT, and are eagerly exploring how their economies might harness the benefits from live data flows and customisation across sectors as diverse as healthcare, manufacturing, infrastructure management and utilities.
In 2015, the UK Government set its aspiration to become "a world leader in the development and implementation of the Internet of Things." However, it also acknowledged that IoT raises unique challenges to data protection and the security of information systems and networks. These concerns are hardly unique to the UK. Connected 'things' are being manufactured and traded around the world. In most cases today, devices are built with extremely limited security specifications designed into their hardware or software, raising significant concerns about the security of rapidly expanding IoT networks.
Below we explore the regulatory approaches emerging in the EU and US in response to the security and privacy challenges of IoT. We find that the preference has, thus far at least, been for light touch regulation, though American and European approaches might soon diverge. Regardless, in order to effectively manage risks and enable societal and economic benefits, we argue governments like the UK need to develop new institutional coordination models that can enable a broad 'culture of security' for IoT across public and private sectors alike.409. Dixon, M.; Wakenshaw, Susan Y. L.; Ng, Irene C. L.; Maple, Carsten: Consumer Perceived Vulnerability, privacy calculus and information disclosure: an empirical investigation in retailer loyalty program. In: 5th Naples Forum on Service, 6-9 June, Sorrento, Italy (2017), 0000. (Type: Proceedings Article | Abstract | Links | BibTeX) @inproceedings{proc-in-dixon_consumer_2017,
title = {Consumer Perceived Vulnerability, privacy calculus and information disclosure: an empirical investigation in retailer loyalty program},
author = {M. Dixon and Susan Y. L. Wakenshaw and Irene C. L. Ng and Carsten Maple},
url = {http://www.naplesforumonservice.it/uploads//files/Wakenshaw, Dixon, Ng.pdf},
booktitle = {5th Naples Forum on Service, 6-9 June, Sorrento, Italy (2017)},
abstract = {This paper investigates how perceived vulnerability moderates the effect of privacy calculus on consumerss' willingness to share information. Consumers' information disclosure behavior has been primarily studied from "privacy calculus" approach. For example, Kehr et al (2015) defined "privacy calculus" as "a situational-specific trade-off of privacy related risk and benefit perceptions, bounded by dispositional tendencies and irrational behavior" (Kehr, et al, 2015). According to Kehr et al (2015), in addition to the benefits and risks, dispositional factors and other situational factors, their gut feeling in these situations also affect consumers information sharing decision making. Indeed, the situational factors associated with psychological limitations and the general dispositional factors make it necessary to consider the constructs such as perceived vulnerability, perceived control and perceived trust into consideration when model the privacy calculus to understand how consumers make the tradeoffs for information disclosure. Therefore, our study contributes to the privacy calculus research literature by identifying the salient factors affecting consumer information disclosure decisions and in particular by providing insights into how consumer's perceived vulnerability could affect the salience and immediacy of privacy related constructs in their decision-making. Empirically, we use discrete choice analysis method. We provide participants with choices from bundles of attributes (constructs identified in the literature). The attributes that are shown are chosen by Sawtooth software in a way that allows all attributes to be compared to all others with the least amount of overlap. Using a monte-carlo style simulation, we can derive the relative importance of each of the attributes. This initial study will allow us to narrow down which elements are most important in a more complex choice analysis. We then use the videos to prime participants into a state of vulnerability. Finally, then we test the priming conditions to see if they make a difference in these choice methods. The theoretical significance of the research is to differentiate the effect of privacy concerns and perceived vulnerability, trust and control on consumer information disclosure. This has empirical implications for firms to find ways to enhance consumers' data sharing/disclosure behavior.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
410. Lindley, Joseph Galen; Coulton, Paul; Akmal, Haider Ali; Hay, Duncan; Kleek, Max Goodwin Van; Cannizzaro, Sara; Binns, Reuben Daniel: The Little Book of Philosophy for the Internet of Things. Lancaster University, 0000, ISBN: 9781862203563. (Type: Book | Abstract | Links | BibTeX) @book{bk-lindley_little_2019,
title = {The Little Book of Philosophy for the Internet of Things},
author = {Joseph Galen Lindley and Paul Coulton and Haider Ali Akmal and Duncan Hay and Max Goodwin Van Kleek and Sara Cannizzaro and Reuben Daniel Binns},
url = {http://www.research.lancs.ac.uk/portal/services/downloadRegister/330473585/Little_Book_of_Philosophy.pdf},
isbn = {9781862203563},
publisher = {Lancaster University},
abstract = {This Little Book is about philosophy. In our research on the PETRAS project,many of the researchers have drawn on different philosophical theoriesto help them to understand some of the difficult relationships between thedigital, physical and connectivity qualities of the Internet of Things (IoT).1In our research, we have had to consider these relationships in terms ofhow they impact privacy, ethics, trust, risk, security, and adoption. So,throughout this book, we present several different philosophical theoriesor strands of thought that help illuminate our research, these are; Thingyness, Hyperobjects, Heterotopias, Respect, Fairness, Ownability, Accelerationism.Because philosophy is so broad and many of its ideas have been aroundfor thousands of years, it can be hard to know how it might apply to somethingas contemporary and technologically focused as the IoT, or to figureout how to get started with that challenge. With this difficulty in mind,the seven chapters in this book each describe how you can use differentaspects of philosophy and theory to think about and understand the IoT.We have written this book in plain English - each of the chapters can beread on their own as a stand-alone, but if you read the whole book, thenthe links between some of the theories and examples will start to becomemore clearly visible.},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
411. Stead, Michael Robert; Coulton, Paul; Lindley, Joseph Galen; Coulton, Claire: The Little Book of Sustainability for the Internet of Things. Imagination Lancaster, 0000, ISBN: 9781862203600. (Type: Book | Abstract | Links | BibTeX) @book{bk-stead_little_2019,
title = {The Little Book of Sustainability for the Internet of Things},
author = {Michael Robert Stead and Paul Coulton and Joseph Galen Lindley and Claire Coulton},
url = {https://www.research.lancs.ac.uk/portal/services/downloadRegister/255919993/Stead_Coulton_Lindley_Coulton._2019._The_Little_Book_of_Sustainability_for_the_Internet_of_Things.pdf},
isbn = {9781862203600},
publisher = {Imagination Lancaster},
abstract = {There are numerous loud and powerful voices promoting the Internet ofThings (IoT) as a catalyst for changing many aspects of our lives for thebetter. Think healthcare, energy, transport, finance, entertainment and inthe home - billions of everyday objects across all sorts of sectors arebeing connected to the Internet to generate data so that we can makequicker and more efficient decisions about many facets of our lives. But isthis technological development completely benign? Despite all their positivepotential, IoT devices are still being designed, manufactured and disposedof in the same manner that most other 'non-connected' consumerproducts have been for decades - unsustainably. Furthermore, little ofthe discourse around the IoT recognises or responds to this growing issue.We hope this Little Book will kickstart this important conversation and helpthose creating future IoT products and services to consider new approachesthat have sustainability baked-in. Further, we propose the re-characterisingof IoT objects as spimes1 to provide an alternative approach forenabling sustainable IoT device design. Spimes are a potential class ofinternet-connected objects which, unlike present day IoT devices, wouldbe designed such that they can be managed sustainably throughout theirentire lifecycle, from their initial design and production, to having theircomponents recycled and reused at the end of their life.},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
412. Blythe, John M.; Johnson, Shane D.: Rapid evidence assessment on labelling schemes and implications for consumer IoT security. 0000. (Type: report | Abstract | Links | BibTeX) @report{rep-blythe_rapid_2018,
title = {Rapid evidence assessment on labelling schemes and implications for consumer IoT security},
author = {John M. Blythe and Shane D. Johnson},
url = {https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/949614/Rapid_evidence_assessment_IoT_security_oct_2018_V2.pdf},
institution = {Dawes Centre for Future Crime at UCL},
abstract = {In March 2018, the Department for Digital, Culture, Media and Sport (DCMS) released their policy review on Secure by Design for consumer "Internet of Things (IoT)" products. As their primary measure, they detail a voluntary code of practice for manufacturers to ship products with features that make them Secure by Design. They also proposed exploring the role of a voluntary labelling scheme to communicate important information to consumers that is otherwise invisible to them, or difficult to elicit, such as how data collected by devices is shared and the support period of the product. Alongside this, the British Standards Institution have announced a kitemark for consumer IoT devices that have been certified to comply with the DCMS code of practice [1]. There has also been community-led approaches to a IoT labelling scheme that covers a number of IoT challenges including security [2]. Furthermore, calls for a trust label [3, 4] or a security rating scheme [5, 6] for consumer IoT are not new but what does differ is the type and format of the proposed labelling scheme.
There are three different labelling formats that have been discussed. The first is a descriptive information label that would detail security-related information such a devices' support period. The second is "seal of approval" labels in which a product is certified to a standard. The third format is a graded scheme that allows more nuanced comparisons of security and to encourage consumer/industry behaviour change. However, what is not well understood is what type of label will likely: a) have the biggest impact in pushing manufacturers to ship products with better security and b) influence consumer choice.
To provide greater insight into the relative merits of different types of labelling, this report outlines a rapid evidence assessment, conducted as part of the Consumer Security Index project (funded by PETRAS Internet of Things Research Hub and the Dawes Centre for Future Crime at UCL), on existing literature exploring the efficacy of labelling schemes in established areas (food and energy efficiency). We also discuss physical security labelling schemes in consumer settings (such as vehicle and home security) and existing work on privacy labels. The report ends with implications for the development of labelling schemes for cybersecurity in the context of the consumer Internet of Things.},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
There are three different labelling formats that have been discussed. The first is a descriptive information label that would detail security-related information such a devices' support period. The second is "seal of approval" labels in which a product is certified to a standard. The third format is a graded scheme that allows more nuanced comparisons of security and to encourage consumer/industry behaviour change. However, what is not well understood is what type of label will likely: a) have the biggest impact in pushing manufacturers to ship products with better security and b) influence consumer choice.
To provide greater insight into the relative merits of different types of labelling, this report outlines a rapid evidence assessment, conducted as part of the Consumer Security Index project (funded by PETRAS Internet of Things Research Hub and the Dawes Centre for Future Crime at UCL), on existing literature exploring the efficacy of labelling schemes in established areas (food and energy efficiency). We also discuss physical security labelling schemes in consumer settings (such as vehicle and home security) and existing work on privacy labels. The report ends with implications for the development of labelling schemes for cybersecurity in the context of the consumer Internet of Things.413. Tanczer, Leonie Maria; Blythe, John M.; Yahya, Fareeha; Brass, Irina; Elsden, Miles; Blackstock, Jason J.; Carr, Madeline: Summary literature review of industry recommendations and international developments on IoT security. 0000. (Type: report | Abstract | Links | BibTeX) @report{rep-tanczer_summary_2017,
title = {Summary literature review of industry recommendations and international developments on IoT security},
author = {Leonie Maria Tanczer and John M. Blythe and Fareeha Yahya and Irina Brass and Miles Elsden and Jason J. Blackstock and Madeline Carr},
url = {https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/973927/PETRAS_Literature_Review_of_Industry_Recommendations_and_International_Developments_on_IoT_Security_V2.pdf},
institution = {PETRAS IoT Hub},
abstract = {The Department for Digital, Culture, Media and Sport (DCMS) commissioned the PETRAS IoT Research Hub, a consortium of nine leading UK universities that work together to explore critical issues in privacy, ethics, trust, reliability, acceptability, and security of the IoT to conduct two separate literature reviews.1 The first, on industry recommendations for government to improve IoT security and the second, on the current international developments around IoT security. There were two aims to these reviews: (i) identify the key themes emerging from the literature and (ii) identify international consensus around core Security by Design principles for the IoT.
In this report, we first summarise the emerging themes from the two reviews, then provide recommendations for government and finish with an overview of the consensus around Secure by Design principles.},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
In this report, we first summarise the emerging themes from the two reviews, then provide recommendations for government and finish with an overview of the consensus around Secure by Design principles.414. Shadbolt, Nigel R.; O'Hara, Kieron; Roure, David Charles De; Hall, Wendy: The Theory and Practice of Social Machines. Springer International Publishing, 0000. (Type: Book | Abstract | Links | BibTeX | Altmetric) @book{bk-shadbolt_theory_2019,
title = {The Theory and Practice of Social Machines},
author = {Nigel R. Shadbolt and Kieron O'Hara and David Charles De Roure and Wendy Hall},
url = {https://doi.org/10.1007%2F978-3-030-10889-2},
doi = {10.1007/978-3-030-10889-2},
publisher = {Springer International Publishing},
abstract = {Social machines are a type of network connected by interactive digital devices made possible by the ubiquitous adoption of technologies such as the Internet, the smartphone, social media and the read/write World Wide Web, connecting people at scale to document situations, cooperate on tasks, exchange information, or even simply to play. Existing social processes may be scaled up, and new social processes enabled, to solve problems, augment reality, create new sources of value, and disrupt existing practice.
This book considers what talents one would need to understand or build a social machine, describes the state of the art, and speculates on the future, from the perspective of the EPSRC project SOCIAM - The Theory and Practice of Social Machines. The aim is to develop a set of tools and techniques for investigating, constructing and facilitating social machines, to enable us to narrow down pragmatically what is becoming a wide space, by asking 'when will it be valuable to use these methods on a sociotechnical system?' The systems for which the use of these methods adds value are social machines in which there is rich person-to-person communication, and where a large proportion of the machine's behaviour is constituted by human interaction.},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
This book considers what talents one would need to understand or build a social machine, describes the state of the art, and speculates on the future, from the perspective of the EPSRC project SOCIAM - The Theory and Practice of Social Machines. The aim is to develop a set of tools and techniques for investigating, constructing and facilitating social machines, to enable us to narrow down pragmatically what is becoming a wide space, by asking 'when will it be valuable to use these methods on a sociotechnical system?' The systems for which the use of these methods adds value are social machines in which there is rich person-to-person communication, and where a large proportion of the machine's behaviour is constituted by human interaction.415. Coullon, Gaelle; Wyatt, B.; MacNaughton, S.; Cartwrigh, A.; Edwards, H. A.; Eglash, S.; Jahn, I.; Nicolescu, Razvan; Rahman, M.; Riel, H.; Ritchie, A.; Schleicher, S.; Tayor, A.; Weinberger, S.: Review of Knowledge Exchange in the Internet of Things. 0000. (Type: report | BibTeX) @report{rep-coullon_review_2018,
title = {Review of Knowledge Exchange in the Internet of Things},
author = {Gaelle Coullon and B. Wyatt and S. MacNaughton and A. Cartwrigh and H. A. Edwards and S. Eglash and I. Jahn and Razvan Nicolescu and M. Rahman and H. Riel and A. Ritchie and S. Schleicher and A. Tayor and S. Weinberger},
institution = {PETRAS IoT Hub},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
416. Seymour, William; Kleek, Max Goodwin Van: The Internet of Kant: Respect as aLens for IoT Design. In: CHI'19 Workshops: Standing on the Shoulders of Giants: Exploring the Intersection of Philosophy and HCI, 0000. (Type: Proceedings Article | Abstract | Links | BibTeX) @inproceedings{proc-in-seymour_internet_2019,
title = {The Internet of Kant: Respect as aLens for IoT Design},
author = {William Seymour and Max Goodwin Van Kleek},
url = {https://www.cs.ox.ac.uk/files/11110/workshop-philosophy.pdf},
booktitle = {CHI'19 Workshops: Standing on the Shoulders of Giants: Exploring the Intersection of Philosophy and HCI},
abstract = {The ethical challenges posed by smart home devices are numerous and widely reported in the CHI literature, but these contributions often identify norms and other factors that are highly context specific. In this position paper, I argue for the use of respect as a philosophical lens with which multifarious ethical concerns can be untangled across devices. After briefly defining directive, obstacle, recognition, and care respect in the context of smart devices, I demonstrate how these concepts can be used to navigate two specific problem points in the smart home.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
417. Evagorou, Giannis; Heinis, Thomas: STATS - A Point Access Method for Multidimensional Clusters. In: DEXA 2017: Database and Expert Systems Applications, pp. 352–361, Springer International Publishing, 0000. (Type: Book Section | Abstract | Links | BibTeX | Altmetric) @incollection{col-in-evagorou_stats_2017,
title = {STATS - A Point Access Method for Multidimensional Clusters},
author = {Giannis Evagorou and Thomas Heinis},
url = {https://doi.org/10.1007%2F978-3-319-64468-4_27},
doi = {10.1007/978-3-319-64468-4_27},
booktitle = {DEXA 2017: Database and Expert Systems Applications},
pages = {352--361},
publisher = {Springer International Publishing},
series = {Lecture Notes in Computer Science 10438},
abstract = {The ubiquity of high-dimensional data in machine learning and data mining applications makes its efficient indexing and retrieval from main memory crucial. Frequently, these machine learning algorithms need to query specific characteristics of single multidimensional points. For example, given a clustered dataset, the cluster membership (CM) query retrieves the cluster to which an object belongs.
To efficiently answer this type of query we have developed STATS, a novel main-memory index which scales to answer CM queries on increasingly big datasets. Current indexing methods are oblivious to the structure of clusters in the data, and we thus, develop STATS around the key insight that exploiting the cluster information when indexing and preserving it in the index will accelerate look up. We show experimentally that STATS outperforms known methods in regards to retrieval time and scales well with dataset size for any number of dimensions.},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
To efficiently answer this type of query we have developed STATS, a novel main-memory index which scales to answer CM queries on increasingly big datasets. Current indexing methods are oblivious to the structure of clusters in the data, and we thus, develop STATS around the key insight that exploiting the cluster information when indexing and preserving it in the index will accelerate look up. We show experimentally that STATS outperforms known methods in regards to retrieval time and scales well with dataset size for any number of dimensions.418. Brass, Irina: Standardising IoT Security: Implications for Digital Forensics. In: vol. 35, pp. 44–48, 0000. (Type: Journal Article | Links | BibTeX) @article{art-brass_standardising_2018,
title = {Standardising IoT Security: Implications for Digital Forensics},
author = {Irina Brass},
url = {https://discovery.ucl.ac.uk/id/eprint/10050054/13/Brass_BRA001-pdf.pdf},
volume = {35},
pages = {44--48},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
419. Yang, Guang-Zhong (Ed.): Implantable Sensors and Systems. Springer International Publishing, 0000. (Type: Book | Abstract | Links | BibTeX | Altmetric) @book{bk-yang_implantable_2018,
title = {Implantable Sensors and Systems},
editor = {Guang-Zhong Yang},
url = {https://doi.org/10.1007%2F978-3-319-69748-2},
doi = {10.1007/978-3-319-69748-2},
publisher = {Springer International Publishing},
abstract = {Comprehensive coverage - from sensor designs to practical applications; addressing both the current state-of-the-art and future research/development directions. In depth analysis of key aspects of implantable sensing, addressing both hardware designs and real-time on-node analytics. Technologically focussed, but with clear guidance on translational pathways and clinical applications},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
420. Speed, Chris; Luger, Ewa A.: Shifting values: An introduction to the value of data in the digital economy. 0000. (Type: report | Abstract | Links | BibTeX) @report{rep-speed_shifting_2019,
title = {Shifting values: An introduction to the value of data in the digital economy},
author = {Chris Speed and Ewa A. Luger},
url = {https://dma.org.uk/uploads/misc/new-vod-white-paper-final.pdf},
institution = {MERKLE and DMA Scotland Council and University of Edinburgh},
abstract = {The Value of Data campaign has been created to help elevate and champion the role of data - from the classroom to the boardroom - and help organisations responsibly deliver value to their customers.
In partnership with the University of Edinburgh, we will create an engaging, navigable roadmap through a challenging ethical and legal landscape to allow bold, innovative and data-led approaches to customer engagement to thrive.
Values are becoming more and more important in customer decisions regarding which brands they engage with and which brands they don't.
This is happening at a time when we're producing more and more, and capturing increasing amounts of data across all of the interactions we have on a daily basis.
Companies are gathering this data and storing it with the promise of providing us with great experiences and services. But are they delivering on this promise?
If so, how many brands could you say are delivering on it? And does it make a difference if what they're offering ties in with your personal values as an individual?
The DMA is launching an exploration into the 'Value of Data'to find answers.
We want to ask difficult questions about where the 'value' of data really lies. In the data? Its quality, quantity etc., or in the way we use it to create better outcomes for customers?
Also, by having better'values' could organisations deliver better outcomes to their business, their customers, and society at large?
Join us on this journey and help unpack the true value of data to help us develop better services, create better experiences and evolve into better societies.
We hope you'll find some of the examples laid out in this paper, by the ever everthought-provoking Chris Speed and Ewa Luger, a fascinating introduction to this multifaceted topic.},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
In partnership with the University of Edinburgh, we will create an engaging, navigable roadmap through a challenging ethical and legal landscape to allow bold, innovative and data-led approaches to customer engagement to thrive.
Values are becoming more and more important in customer decisions regarding which brands they engage with and which brands they don't.
This is happening at a time when we're producing more and more, and capturing increasing amounts of data across all of the interactions we have on a daily basis.
Companies are gathering this data and storing it with the promise of providing us with great experiences and services. But are they delivering on this promise?
If so, how many brands could you say are delivering on it? And does it make a difference if what they're offering ties in with your personal values as an individual?
The DMA is launching an exploration into the 'Value of Data'to find answers.
We want to ask difficult questions about where the 'value' of data really lies. In the data? Its quality, quantity etc., or in the way we use it to create better outcomes for customers?
Also, by having better'values' could organisations deliver better outcomes to their business, their customers, and society at large?
Join us on this journey and help unpack the true value of data to help us develop better services, create better experiences and evolve into better societies.
We hope you'll find some of the examples laid out in this paper, by the ever everthought-provoking Chris Speed and Ewa Luger, a fascinating introduction to this multifaceted topic.421. Blythe, John M.; Lefevre, Carmen: Cyberhygiene Insight Report. 0000. (Type: report | Abstract | Links | BibTeX) @report{rep-blythe_cyberhygiene_2017,
title = {Cyberhygiene Insight Report},
author = {John M. Blythe and Carmen Lefevre},
url = {https://iotuk.org.uk/wp-content/uploads/2018/01/PETRAS-IoTUK-Cyberhygiene-Insight-Report.pdf},
institution = {PETRAS and IoTUK.org.uk},
abstract = {Internet-connected products are everywhere these days, in our homes, in our offices and pervasive throughout our lives. They allow us to monitor the temperature in our apartments, to put the kettle on before we even get out of our beds and to reduce our carbon footprint through reduced energy wastage, for example.
However, the Internet of Things (IoT) poses many threats to consumers. Products that are 'Secure by Design' are the ideal, however currently many 'things' in the IoT are far from secure and users need to take action to help protect their internet connected products.
This issue can be seen in the numerous incursions and hacks reported regularly in the press. With attacks on driverless cars turning off the engine on a moving vehicle, strangers being able to talk to children through connected toys or attacks on cameras we may have in our homes to keep us secure, the exciting and rapidly changing world in which we live can also potentially allow unwanted intrusion into our lives through cyber security breaches and the introduction of more technology into our homes.
To help counter cyber threats, consumers will need to adopt protective behaviours when using internetconnected products. Such behaviours are wide ranging from using strong and unique passwords to taking unsafe products off the home Wi-Fi. However, to encourage protective behaviours when using internet connected products, we first need to understand what consumers need to do to protect their products.
This report has been prepared by UCL researchers as part of PETRAS, a large research programme examining cyber security in the context of the IoT The cyberhygiene project focused on designing ways to effect behavioural change in consumers in order to improve their cyber security practises. Cyberhygiene is the practices that people use to stay secure and safe when using connected devices.
In this report, we detail the studies that identify key protective behaviours across product lifecycles (purchasing, set-up and maintenance, and disposal) that users could engage in to protect themselves based on experts' and users' perceptions.
By empowering consumers with practical advice that they will actually use, as well as persuading manufacturers to follow 'Secure by Design' principles, the IoT can be made more secure for consumers.},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
However, the Internet of Things (IoT) poses many threats to consumers. Products that are 'Secure by Design' are the ideal, however currently many 'things' in the IoT are far from secure and users need to take action to help protect their internet connected products.
This issue can be seen in the numerous incursions and hacks reported regularly in the press. With attacks on driverless cars turning off the engine on a moving vehicle, strangers being able to talk to children through connected toys or attacks on cameras we may have in our homes to keep us secure, the exciting and rapidly changing world in which we live can also potentially allow unwanted intrusion into our lives through cyber security breaches and the introduction of more technology into our homes.
To help counter cyber threats, consumers will need to adopt protective behaviours when using internetconnected products. Such behaviours are wide ranging from using strong and unique passwords to taking unsafe products off the home Wi-Fi. However, to encourage protective behaviours when using internet connected products, we first need to understand what consumers need to do to protect their products.
This report has been prepared by UCL researchers as part of PETRAS, a large research programme examining cyber security in the context of the IoT The cyberhygiene project focused on designing ways to effect behavioural change in consumers in order to improve their cyber security practises. Cyberhygiene is the practices that people use to stay secure and safe when using connected devices.
In this report, we detail the studies that identify key protective behaviours across product lifecycles (purchasing, set-up and maintenance, and disposal) that users could engage in to protect themselves based on experts' and users' perceptions.
By empowering consumers with practical advice that they will actually use, as well as persuading manufacturers to follow 'Secure by Design' principles, the IoT can be made more secure for consumers.422. Binns, Reuben Daniel; Kleek, Max Goodwin Van; Zhao, Jun; Lyngs, Ulrik; Shadbolt, Nigel R.: Supporting informed, idiosyncratic privacy preferences through personalised exposure profiles. In: 2018 Networked Privacy Workshop at CHI, 0000. (Type: Proceedings Article | Abstract | Links | BibTeX) @inproceedings{proc-in-binns_supporting_2018,
title = {Supporting informed, idiosyncratic privacy preferences through personalised exposure profiles},
author = {Reuben Daniel Binns and Max Goodwin Van Kleek and Jun Zhao and Ulrik Lyngs and Nigel R. Shadbolt},
url = {https://networkedprivacy2018.files.wordpress.com/2018/04/binns.pdf},
booktitle = {2018 Networked Privacy Workshop at CHI},
abstract = {Are there 'good' privacy decisions that can be considered universally appropriate for end-users? In this paper, we draw together findings from previous work on privacy attitudes regarding tracking of end-users by third parties via smartphone applications. In particular, we highlight a range of highly idiosyncratic privacy preferences which are elicited only after people have had the chance to explore and reflect upon detailed, complex and personalised information about their data flows.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
423. Wachter, Sandra: The GDPR and the Internet of Things: a three-step transparency model. In: vol. 10, no. 2, pp. 266–294, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-wachter_gdpr_2018,
title = {The GDPR and the Internet of Things: a three-step transparency model},
author = {Sandra Wachter},
doi = {10.1080/17579961.2018.1527479},
volume = {10},
number = {2},
pages = {266--294},
publisher = {Informa UK Limited},
abstract = {The Internet of Things (IoT) requires pervasive collection and linkage of user data to provide personalised experiences based on potentially invasive inferences. Consistent identification of users and devices is necessary for this functionality, which poses risks to user privacy. The General Data Protection Regulation (GDPR) contains numerous provisions relevant to these risks, which may nonetheless be insufficient to ensure a fair balance between users' and developers' interests. A three-step transparency model is described based on known privacy risks of the IoT, the GDPR's governing principles, and weaknesses in its relevant provisions. Eleven ethical guidelines are proposed for IoT developers and data controllers on how information about the functionality of the IoT should be shared with users above the GDPR's legally binding requirements. Two use cases demonstrate how the guidelines apply in practice: IoT in public spaces and connected cities, and connected cars.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
424. Pothong, Kruakae; Brass, Irina; Carr, Madeline (Ed.): Cybersecurity of the Internet of Things: PETRAS Stream Report. 0000. (Type: Collection | Links | BibTeX) @collection{col-pothong_cybersecurity_2019,
title = {Cybersecurity of the Internet of Things: PETRAS Stream Report},
editor = {Kruakae Pothong and Irina Brass and Madeline Carr},
url = {https://s3-eu-west-1.amazonaws.com/uclpetras/wp-content/uploads/2019/10/28144344/PETRAS-Stream-Report.pdf},
institution = {PETRAS Cybersecurity of the Internet of Things Research Hub},
keywords = {},
pubstate = {published},
tppubtype = {collection}
}
425. Beaumont, Paul; Day, Edward; Evans, Neil; Haworth, Sam; Huth, Michael; Plant, Toen; Roberts, Catherine: An in-depth case study: modelling an information barrier with Bayesian Belief Networks. In: 57th Institute of Nuclear Materials Management Annual Meeting, 0000. (Type: Proceedings Article | Abstract | Links | BibTeX) @inproceedings{proc-in-beaumont_depth_2016,
title = {An in-depth case study: modelling an information barrier with Bayesian Belief Networks},
author = {Paul Beaumont and Edward Day and Neil Evans and Sam Haworth and Michael Huth and Toen Plant and Catherine Roberts},
url = {https://spiral.imperial.ac.uk:8443/handle/10044/1/41828},
booktitle = {57th Institute of Nuclear Materials Management Annual Meeting},
abstract = {We present in detail a quantitative Bayesian Belief Network (BBN) model of the use of an information barrier system during a nuclear arms control inspection, and an analysis of this model using the capabilities of a Satisfiability Modulo Theory (SMT) solver. Arms control verification processes do not in practice allow the parties involved to gather complete information about each other, and therefore any model we use must be able to cope with the limited information, subjective assessment and uncertainty in this domain. We have previously extended BBNs to allow this kind of uncertainty in parameter values (such as probabilities) to be reflected; these constrained BBNs (cBBNs) offer the potential for more robust modelling, which in that study we demonstrated with a simple information barrier model. We now present a much more detailed model of a similar verification process, based on the technical capabilities and deployment concept of the UK-Norway Initiative (UKNI) Information Barrier system, demonstrating the scalability of our previously-presented approach. We discuss facets of the model itself in detail, before analysing pertinent questions of interest to give examples of the power of this approach.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
426. Brass, Irina: Navigating and Informing the IoT Standards Landscape. 0000. (Type: report | Abstract | Links | BibTeX) @report{rep-brass_navigating_2019,
title = {Navigating and Informing the IoT Standards Landscape},
author = {Irina Brass},
url = {https://www.bsigroup.com/en-GB/navigating-and-informing-the-iot-standards-landscape/},
institution = {BSI and PETRAS National Centre of Excellence for IoT Systems Cybersecurity},
abstract = {The world of IoT standards and policy making is moving very quickly and in a good direction. However, research conducted by BSI and the PETRAS IoT Research Hub into both formal and informal standards making reiterates the difficulties that companies, whether large or small, face in finding and implementing standards.
Read our white paper to find out about some of the main opportunities and challenges that IoT SMEs (small and medium size enterprises) and start-ups face when trying to develop connected products and associated IoT services in a responsible and transparent manner.
The challenges highlight standardization priorities for these players.},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
Read our white paper to find out about some of the main opportunities and challenges that IoT SMEs (small and medium size enterprises) and start-ups face when trying to develop connected products and associated IoT services in a responsible and transparent manner.
The challenges highlight standardization priorities for these players.427. Shadbolt, Nigel R.; Hampson, Roger: The Digital Ape: How to Live (in Peace) with Smart Machines. Oxford University Press, 0000, ISBN: 978-0190932985. (Type: Book | Abstract | BibTeX) @book{bk-shadbolt_digital_2019,
title = {The Digital Ape: How to Live (in Peace) with Smart Machines},
author = {Nigel R. Shadbolt and Roger Hampson},
isbn = {978-0190932985},
publisher = {Oxford University Press},
abstract = {The smart-machines revolution is reshaping our lives and our societies. Here, Sir Nigel Shadbolt, one of the world's leading authorities on artificial intelligence, and Roger Hampson dispel terror, confusion, and misconception. We are not about to be elbowed aside by a rebel army of super-intelligent robots of our own creation. We were using tools before we became Homo sapiens, and will continue to build and master them, no matter how complicated they become. How we exercise that control--in our private lives, in employment, in politics--and make the best of the wonderful opportunities, will determine our collective future well-being.
Chapter by chapter, The Digital Ape outline how our choices and the use and adaptation of the tools we've created can lead to opportunities for the environment (both built and natural), health, and our security. Shadbolt and Hampson are uniquely well-suited to draw on historical precedent and technical know-how to offer a vision of the future that is exciting, rather than nerve-wracking, to contemplate.},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
Chapter by chapter, The Digital Ape outline how our choices and the use and adaptation of the tools we've created can lead to opportunities for the environment (both built and natural), health, and our security. Shadbolt and Hampson are uniquely well-suited to draw on historical precedent and technical know-how to offer a vision of the future that is exciting, rather than nerve-wracking, to contemplate.428. Tanczer, Leonie Maria; Steenmans, Ine; Brass, Irina; Carr, Madeline: Networked World: Risks and Opportunities in the Internet of Things. 0000. (Type: report | Abstract | Links | BibTeX) @report{rep-tanczer_networked_2018,
title = {Networked World: Risks and Opportunities in the Internet of Things},
author = {Leonie Maria Tanczer and Ine Steenmans and Irina Brass and Madeline Carr},
url = {https://assets.lloyds.com/assets/pdf-networked-world-2018/1/pdf-networked-world-2018.pdf},
institution = {PETRAS / UCL STEaPP},
abstract = {The Internet of Things (IoT) - devices that are connected to the Internet and collect and use data to operate - is about to transform society. Everything from smart fridges and lightbulbs to remote sensors and cities will collect data that can be analysed and used to provide a wealth of bespoke products and services.
The impacts will be huge - by 2020, some 25 billion devices will be connected to the Internet with some studies estimating this number will rise to 125 billion in 2030. These will include many things that have never been connected to the Internet before. Like all new technologies, IoT offers substantial new opportunities which must be considered in parallel with the new risks that come with it.
To make sense of this new world, Lloyd's worked with University College London's (UCL) Department of Science, Technology, Engineering and Public Policy (STEaPP) and the PETRAS IoT Research Hub to publish this report.
'Networked world' analyses IoT's opportunities, risks and regulatory landscape.
It aims to help insurers understand potential exposures across marine, smart homes, water infrastructure and agriculture while highlighting the implications for insurance operations and product development.},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
The impacts will be huge - by 2020, some 25 billion devices will be connected to the Internet with some studies estimating this number will rise to 125 billion in 2030. These will include many things that have never been connected to the Internet before. Like all new technologies, IoT offers substantial new opportunities which must be considered in parallel with the new risks that come with it.
To make sense of this new world, Lloyd's worked with University College London's (UCL) Department of Science, Technology, Engineering and Public Policy (STEaPP) and the PETRAS IoT Research Hub to publish this report.
'Networked world' analyses IoT's opportunities, risks and regulatory landscape.
It aims to help insurers understand potential exposures across marine, smart homes, water infrastructure and agriculture while highlighting the implications for insurance operations and product development.429. Watson, Jeremy Daniel McKendrick; Ani, Uchenna P. Daniel: Review of Open Source Simulators in ICS/IIoT Security Context. 0000. (Type: report | Links | BibTeX) @report{rep-watson_review_2018,
title = {Review of Open Source Simulators in ICS/IIoT Security Context},
author = {Jeremy Daniel McKendrick Watson and Uchenna P. Daniel Ani},
url = {https://www.petrashub.org/open-source-simulators-report/},
institution = {PETRAS IoT Hub},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
430. Lesniewska, Feja; McCann, Julie A.: Little Book of Critical Infrastructure and the Internet of Things. ImaginationLancaster, Lancaster University, 0000, ISBN: 978-1-86220-359-4. (Type: Book | Abstract | Links | BibTeX) @book{bk-lesniewska_little_2019,
title = {Little Book of Critical Infrastructure and the Internet of Things},
author = {Feja Lesniewska and Julie A. McCann},
editor = {Claire Coulton},
url = {https://petras-iot.org/wp-content/uploads/2020/10/Little_Book_of_Critical_Infrastructure.pdf},
isbn = {978-1-86220-359-4},
publisher = {ImaginationLancaster, Lancaster University},
abstract = {This Little Book reveals how new information and communication technologies (ICT), such as sensors, data analytics, artificial intelligence and cloud computers, incorporated into critical infrastructures that society depends on for services like health, energy, transport and agriculture, can bring about huge benefits. However, incorporating these new ICTs into critical infrastructure can also result in new risks, some yet unknown, which may threaten the security of society, the environment and human well-being.},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
431. Deschamps-Sonsino, Alexandra; Hudson-Smith, Andrew; Wilson, Duncan: The Little Book of Public Space and the Internet of Things. ImaginationLancaster, Lancaster University, 0000, ISBN: 978-1-86220-391-4. (Type: Book | Abstract | Links | BibTeX) @book{bk-deschamps-sonsino_little_2020,
title = {The Little Book of Public Space and the Internet of Things},
author = {Alexandra Deschamps-Sonsino and Andrew Hudson-Smith and Duncan Wilson},
editor = {Claire Coulton},
url = {https://petras-iot.org/wp-content/uploads/2020/12/Little_Book_of_Public_Space_IoT.pdf},
isbn = {978-1-86220-391-4},
publisher = {ImaginationLancaster, Lancaster University},
abstract = {Our public spaces are changing, they are at the forefront of a technological revolution yet this is a revolution that often remains hidden from sight. Sensors are being installed and the ability to interact with objects in our spaces - from projects such as the PETRAS Talking Trees through to conversations with Lamp Posts or data interactions with local wildlife is changing our interactions both in and with these places and spaces.
This Little Book explores safety and security and moves onto maintenance. We then look at some of the issues affecting people and explore health, community building and culture while exploring the use of public space for play. After this, we explore conservation and culture, transport and signage, accessibility and then, finally, we discuss future trends.},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
This Little Book explores safety and security and moves onto maintenance. We then look at some of the issues affecting people and explore health, community building and culture while exploring the use of public space for play. After this, we explore conservation and culture, transport and signage, accessibility and then, finally, we discuss future trends.432. Coulton, Paul; Lindley, Joseph Galen; Cooper, Rachel: The Little Book of Design Fiction for the Internet of Things. ImaginationLancaster, Lancaster University, 0000, ISBN: 978-1-86220-346-4. (Type: Book | Abstract | Links | BibTeX) @book{bk-coulton_little_2018,
title = {The Little Book of Design Fiction for the Internet of Things},
author = {Paul Coulton and Joseph Galen Lindley and Rachel Cooper},
editor = {Claire Coulton},
url = {https://petras-iot.org/wp-content/uploads/2020/10/Little_Book_of_Design_Fiction.pdf},
isbn = {978-1-86220-346-4},
publisher = {ImaginationLancaster, Lancaster University},
abstract = {This Little Book is about designing the future in a world of the Internet of Things. The book explains why it's important to understand how the IoT will shape our lives in the future and how we can use Design Fiction to explore these futures.},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
433. Watson, Jeremy Daniel McKendrick; Ani, Uchenna P. Daniel: Critical Infrastructure Protection Approaches: Analytical Outlook on Capacity Responsiveness to Dynamic Trends. 0000. (Type: report | Links | BibTeX) @report{rep-watson_critical_2019,
title = {Critical Infrastructure Protection Approaches: Analytical Outlook on Capacity Responsiveness to Dynamic Trends},
author = {Jeremy Daniel McKendrick Watson and Uchenna P. Daniel Ani},
url = {https://www.semanticscholar.org/paper/Critical-Infrastructure-Protection-Approaches-on-to-Watson-Ani/ca4d152916c40233747ed12aa083f7ef681b0fc5},
institution = {PETRAS Cybersecurity Research Hub, STEaPP, University College London, United Kingdom},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
434. Brass, Irina; Tanczer, Leonie Maria; Maple, Carsten; Blackstock, Jason J.; Carr, Madeline: Unbundling the Emerging Cyber-Physical Risks in Connected and Autonomous Vehicles: Part II. In: Appt, S.; Livesey, N. (Ed.): See the road ahead Connected and autonomous vehicles: The emerging legal challenges., pp. 7–9, 0000. (Type: Book Section | Abstract | Links | BibTeX) @incollection{col-in-brass_unbundling_2018,
title = {Unbundling the Emerging Cyber-Physical Risks in Connected and Autonomous Vehicles: Part II},
author = {Irina Brass and Leonie Maria Tanczer and Carsten Maple and Jason J. Blackstock and Madeline Carr},
editor = {S. Appt and N. Livesey},
url = {https://ssrn.com/abstract=3415098},
booktitle = {See the road ahead Connected and autonomous vehicles: The emerging legal challenges.},
pages = {7--9},
abstract = {The transformations emerging from CAV technologies raise questions about the readiness of current regulatory approaches to vehicle safety and cyber security, ownership and liability, and data protection.},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
435. Brass, Irina; Carr, Madeline; Blackstock, Jason J.: The IoT Effect: The Future of Data Protection and Information Security in the UK. In: Political Studies Association (PSA) 67th Annual International Conference, 10-12 April, Glasgow, EU and UK Regulation in Transition Panel, 0000. (Type: Proceedings Article | Links | BibTeX) @inproceedings{proc-in-brass_iot_2017,
title = {The IoT Effect: The Future of Data Protection and Information Security in the UK},
author = {Irina Brass and Madeline Carr and Jason J. Blackstock},
url = {https://www.psa.ac.uk/conference/2017-conference/conference-programme},
booktitle = {Political Studies Association (PSA) 67th Annual International Conference, 10-12 April, Glasgow, EU and UK Regulation in Transition Panel},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
436. Shipworth, David; Burger, Christoph; Weinmann, Jens; Sioshansi, Fereidoon: Peer-to-Peer Trading and Blockchains: Enabling Regional Energy Markets and Platforms for Energy Transactions. In: Consumer, Prosumer, Prosumager, pp. 27–52, Elsevier, 0000. (Type: Book Section | Abstract | Links | BibTeX | Altmetric) @incollection{col-in-shipworth_peer_2019,
title = {Peer-to-Peer Trading and Blockchains: Enabling Regional Energy Markets and Platforms for Energy Transactions},
author = {David Shipworth and Christoph Burger and Jens Weinmann and Fereidoon Sioshansi},
url = {https://doi.org/10.1016%2Fb978-0-12-816835-6.00002-4},
doi = {10.1016/b978-0-12-816835-6.00002-4},
booktitle = {Consumer, Prosumer, Prosumager},
pages = {27--52},
publisher = {Elsevier},
abstract = {Decarbonization has driven the uptake of variable renewable energy resources, both utility scale and distributed. This is driving the development of new business models of how electricity is distributed and managed on the network. One such model, peer-to-peer trading, allows consumers, prosumers, and prosumagers to trade energy between themselves, both lowering costs while providing balancing services to the network. Enabling technologies such as blockchains can help build trust and track transactions efficiently, securely and at low cost. This chapter examines the factors governing successful deployment of such systems and technical and regulatory challenges.},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
437. Taylor, Paul; Allpress, Steve; Carr, Madeline; Lupu, Emil C.; Norton, Jim; Smith, Liane; Blackstock, Jason J.; Boyes, Hugh; Hudson-Smith, Andrew; Brass, Irina; Chizari, Hassan; Cooper, Rachel; Coulton, Paul; Craggs, Barnaby; Davies, Nigel; Roure, David Charles De; Elsden, Miles; Huth, Michael; Lindley, Joseph Galen; Maple, Carsten; Mittelstadt, Brent Daniel; Nicolescu, Razvan; Nurse, Jason R. C.; Procter, Rob; Radanliev, Petar; Rashid, Awais; Sgandurra, Daniele; Skatova, Anya; Taddeo, Mariarosaria; Tanczer, Leonie Maria; Vieira-Steiner, Rodrigo; Watson, Jeremy Daniel McKendrick; Wachter, Sandra; Wakenshaw, Susan Y. L.; Carvalho, Graça; Thompson, Robert J.; Westbury, Philippa S.: Internet of Things: Realising the Potential of a Trusted Smart World. 0000. (Type: report | Abstract | Links | BibTeX) @report{rep-taylor_internet_2018,
title = {Internet of Things: Realising the Potential of a Trusted Smart World},
author = {Paul Taylor and Steve Allpress and Madeline Carr and Emil C. Lupu and Jim Norton and Liane Smith and Jason J. Blackstock and Hugh Boyes and Andrew Hudson-Smith and Irina Brass and Hassan Chizari and Rachel Cooper and Paul Coulton and Barnaby Craggs and Nigel Davies and David Charles De Roure and Miles Elsden and Michael Huth and Joseph Galen Lindley and Carsten Maple and Brent Daniel Mittelstadt and Razvan Nicolescu and Jason R. C. Nurse and Rob Procter and Petar Radanliev and Awais Rashid and Daniele Sgandurra and Anya Skatova and Mariarosaria Taddeo and Leonie Maria Tanczer and Rodrigo Vieira-Steiner and Jeremy Daniel McKendrick Watson and Sandra Wachter and Susan Y. L. Wakenshaw and Gra\c{c}a Carvalho and Robert J. Thompson and Philippa S. Westbury},
url = {https://www.raeng.org.uk/publications/reports/internet-of-things-realising-the-potential-of-a-tr},
institution = {Royal Academy of Engineering and PETRAS IoT Hub},
abstract = {This report examines the policy challenges for the Internet of Things (IoT), and raises a broad range of issues that need to be considered if policy is to be effective and the potential economic value of IoT is harnessed. It builds on the Blackett review, The Internet of Things: making the most of the second digital revolution, adding detailed knowledge based on research from the PETRAS Cybersecurity of the Internet of Things Research Hub and input from Fellows of the Royal Academy of Engineering. The report targets government policymakers, regulators, standards bodies and national funding bodies, and will also be of interest to suppliers and adopters of IoT products and services.},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
438. Wachter, Sandra: Normative challenges of identification in the Internet of Things: Privacy, profiling, discrimination, and the GDPR. In: vol. 34, no. 3, pp. 436–449, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-wachter_normative_2018,
title = {Normative challenges of identification in the Internet of Things: Privacy, profiling, discrimination, and the GDPR},
author = {Sandra Wachter},
url = {https://doi.org/10.1016%2Fj.clsr.2018.02.002},
doi = {10.1016/j.clsr.2018.02.002},
volume = {34},
number = {3},
pages = {436--449},
publisher = {Elsevier BV},
abstract = {In the Internet of Things (IoT), identification and access control technologies provide essential infrastructure to link data between a user's devices with unique identities, and provide seamless and linked up services. At the same time, profiling methods based on linked records can reveal unexpected details about users' identity and private life, which can conflict with privacy rights and lead to economic, social, and other forms of discriminatory treatment. A balance must be struck between identification and access control required for the IoT to function and user rights to privacy and identity. Striking this balance is not an easy task because of weaknesses in cybersecurity and anonymisation techniques. The EU General Data Protection Regulation (GDPR), set to come into force in May 2018, may provide essential guidance to achieve a fair balance between the interests of IoT providers and users. Through a review of academic and policy literature, this paper maps the inherent tension between privacy and identifiability in the IoT. It focuses on four challenges: (1) profiling, inference, and discrimination; (2) control and context-sensitive sharing of identity; (3) consent and uncertainty; and (4) honesty, trust, and transparency. The paper will then examine the extent to which several standards defined in the GDPR will provide meaningful protection for privacy and control over identity for users of IoT. The paper concludes that in order to minimise the privacy impact of the conflicts between data protection principles and identification in the IoT, GDPR standards urgently require further specification and implementation into the design and deployment of IoT technologies.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
439. Janeček, Václav: Ownership of personal data in the Internet of Things. In: vol. 34, no. 5, pp. 1039–1052, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-janecek_ownership_2018,
title = {Ownership of personal data in the Internet of Things},
author = {V\'{a}clav Jane\v{c}ek},
url = {https://doi.org/10.1016%2Fj.clsr.2018.04.007},
doi = {10.1016/j.clsr.2018.04.007},
volume = {34},
number = {5},
pages = {1039--1052},
publisher = {Elsevier BV},
abstract = {This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This consideration is framed around two main approaches shaping all ownership theories: a bottom-up and top-down approach. Via these dual lenses, the article reviews existing debates relating to four elements supporting introduction of ownership of personal data, namely the elements of control, protection, valuation, and allocation of personal data. It then explores the explanatory advantages and disadvantages of the two approaches in relation to each of these elements as well as to ownership of personal data in IoT at large. Lastly, this article outlines a revised approach to ownership of personal data in IoT that may serve as a blueprint for future work in this area and inform regulatory and policy debates.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
440. Tanczer, Leonie Maria; Brass, Irina; Elsden, Miles; Carr, Madeline; Blackstock, Jason J.: The United Kingdom's Emerging Internet of Things (IoT) Policy Landscape. In: Ellis, Ryan; Mohan, Vivek (Ed.): Rewired: Cybersecurity Governance, pp. 37–56, 0000, ISBN: 978-1-118-88821-6. (Type: Book Section | Abstract | Links | BibTeX) @incollection{col-in-tanczer_united_2019,
title = {The United Kingdom's Emerging Internet of Things (IoT) Policy Landscape},
author = {Leonie Maria Tanczer and Irina Brass and Miles Elsden and Madeline Carr and Jason J. Blackstock},
editor = {Ryan Ellis and Vivek Mohan},
url = {https://www.wiley.com/en-ad/Rewired: Cybersecurity Governance-p-9781119085171},
isbn = {978-1-118-88821-6},
booktitle = {Rewired: Cybersecurity Governance},
pages = {37--56},
chapter = {3},
abstract = {Examines the governance challenges of cybersecurity through twelve, real-world case studies
Through twelve detailed case studies, this superb collection provides an overview of the ways in which government officials and corporate leaders across the globe are responding to the challenges of cybersecurity. Drawing perspectives from industry, government, and academia, the book incisively analyzes the actual issues, and provides a guide to the continually evolving cybersecurity ecosystem. It charts the role that corporations, policymakers, and technologists are playing in defining the contours of our digital world.
Rewired: Cybersecurity Governance places great emphasis on the interconnection of law, policy, and technology in cyberspace. It examines some of the competing organizational efforts and institutions that are attempting to secure cyberspace and considers the broader implications of the in-place and unfolding efforts\textemdashtracing how different notions of cybersecurity are deployed and built into stable routines and practices. Ultimately, the book explores the core tensions that sit at the center of cybersecurity efforts, highlighting the ways in which debates about cybersecurity are often inevitably about much more.
Introduces the legal and policy dimensions of cybersecurity
Collects contributions from an international collection of scholars and practitioners
Provides a detailed "map" of the emerging cybersecurity ecosystem, covering the role that corporations, policymakers, and technologists play
Uses accessible case studies to provide a non-technical description of key terms and technologies
Rewired: Cybersecurity Governance is an excellent guide for all policymakers, corporate leaders, academics, students, and IT professionals responding to and engaging with ongoing cybersecurity challenges.},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
Through twelve detailed case studies, this superb collection provides an overview of the ways in which government officials and corporate leaders across the globe are responding to the challenges of cybersecurity. Drawing perspectives from industry, government, and academia, the book incisively analyzes the actual issues, and provides a guide to the continually evolving cybersecurity ecosystem. It charts the role that corporations, policymakers, and technologists are playing in defining the contours of our digital world.
Rewired: Cybersecurity Governance places great emphasis on the interconnection of law, policy, and technology in cyberspace. It examines some of the competing organizational efforts and institutions that are attempting to secure cyberspace and considers the broader implications of the in-place and unfolding efforts—tracing how different notions of cybersecurity are deployed and built into stable routines and practices. Ultimately, the book explores the core tensions that sit at the center of cybersecurity efforts, highlighting the ways in which debates about cybersecurity are often inevitably about much more.
Introduces the legal and policy dimensions of cybersecurity
Collects contributions from an international collection of scholars and practitioners
Provides a detailed "map" of the emerging cybersecurity ecosystem, covering the role that corporations, policymakers, and technologists play
Uses accessible case studies to provide a non-technical description of key terms and technologies
Rewired: Cybersecurity Governance is an excellent guide for all policymakers, corporate leaders, academics, students, and IT professionals responding to and engaging with ongoing cybersecurity challenges.441. Boyes, Hugh; Hallaq, Bil; Cunningham, Joe; Watson, Tim: The industrial internet of things (IIoT): An analysis framework. In: vol. 101, pp. 1–12, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-boyes_industrial_2018,
title = {The industrial internet of things (IIoT): An analysis framework},
author = {Hugh Boyes and Bil Hallaq and Joe Cunningham and Tim Watson},
url = {https://doi.org/10.1016%2Fj.compind.2018.04.015},
doi = {10.1016/j.compind.2018.04.015},
volume = {101},
pages = {1--12},
publisher = {Elsevier BV},
abstract = {Historically, Industrial Automation and Control Systems (IACS) were largely isolated from conventional digital networks such as enterprise ICT environments. Where connectivity was required, a zoned architecture was adopted, with firewalls and/or demilitarized zones used to protect the core control system components. The adoption and deployment of 'Internet of Things' (IoT) technologies is leading to architectural changes to IACS, including greater connectivity to industrial systems. This paper reviews what is meant by Industrial IoT (IIoT) and relationships to concepts such as cyber-physical systems and Industry 4.0. The paper develops a definition of IIoT and analyses related partial IoT taxonomies. It develops an analysis framework for IIoT that can be used to enumerate and characterise IIoT devices when studying system architectures and analysing security threats and vulnerabilities. The paper concludes by identifying some gaps in the literature.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
442. Kwok-Ho, Cheung; Huth, Michael; Kirk, Laurence M.; Lundbæk, Leif-Nissen; Marques, Rodolphe; Petsche, Jan: The FROST Language. A trusted and user-centric access control language: Enabling delegation of fine-grained policies in shared ecosystems. 0000. (Type: report | Links | BibTeX) @report{rep-kwok-ho_frost_2018,
title = {The FROST Language. A trusted and user-centric access control language: Enabling delegation of fine-grained policies in shared ecosystems},
author = {Cheung Kwok-Ho and Michael Huth and Laurence M. Kirk and Leif-Nissen Lundb\aek and Rodolphe Marques and Jan Petsche},
url = {https://www.xain.foundation/assets/downloads/xain-frost-yellow-paper.pdf},
institution = {Xain Foundation},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
443. Radanliev, Petar; Roure, David Charles De; Nicolescu, Razvan; Huth, Michael; Montalvo, Rafael Mantilla; Cannady, Stacy; Burnap, Peter: Future Developments in Cyber Risk Assessment for the Internet of Things. In: vol. 102, pp. 14–22, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-radanliev_future_2018,
title = {Future Developments in Cyber Risk Assessment for the Internet of Things},
author = {Petar Radanliev and David Charles De Roure and Razvan Nicolescu and Michael Huth and Rafael Mantilla Montalvo and Stacy Cannady and Peter Burnap},
url = {https://doi.org/10.1016%2Fj.compind.2018.08.002},
doi = {10.1016/j.compind.2018.08.002},
volume = {102},
pages = {14--22},
publisher = {Elsevier BV},
abstract = {This article is focused on the economic impact assessment of Internet of Things (IoT) and its associated cyber risks vectors and vertices - a reinterpretation of IoT verticals. We adapt to IoT both the Cyber Value at Risk model, a well-established model for measuring the maximum possible loss over a given time period, and the MicroMort model, a widely used model for predicting uncertainty through units of mortality risk. The resulting new IoT MicroMort for calculating IoT risk is tested and validated with real data from the BullGuard's IoT Scanner (over 310,000 scans) and the Garner report on IoT connected devices. Two calculations are developed, the current state of IoT cyber risk and the future forecasts of IoT cyber risk. Our work therefore advances the efforts of integrating cyber risk impact assessments and offer a better understanding of economic impact assessment for IoT cyber risk.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
444. Lundbæk, Leif-Nissen; Beutel, Daniel Janes: Yellow Paper: Version 1.2 Practical Proof of Kernel Work & Distributed Adaptiveness: A Resilient & Scalable Blockchain Platform for Dynamic Low-Energy Networks. 0000. (Type: report | BibTeX) @report{rep-lundbaek_yellow_2017,
title = {Yellow Paper: Version 1.2 Practical Proof of Kernel Work \& Distributed Adaptiveness: A Resilient \& Scalable Blockchain Platform for Dynamic Low-Energy Networks},
author = {Leif-Nissen Lundb\aek and Daniel Janes Beutel},
institution = {Xain.io},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
445. Edwards, Matthew John; Larson, Robert; Green, Benjamin; Rashid, Awais; Baron, Alistair: Panning for gold: Automatically analysing online social engineering attack surfaces. In: vol. 69, pp. 18–34, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-edwards_panning_2017,
title = {Panning for gold: Automatically analysing online social engineering attack surfaces},
author = {Matthew John Edwards and Robert Larson and Benjamin Green and Awais Rashid and Alistair Baron},
url = {https://doi.org/10.1016%2Fj.cose.2016.12.013},
doi = {10.1016/j.cose.2016.12.013},
volume = {69},
pages = {18--34},
publisher = {Elsevier BV},
abstract = {The process of social engineering targets people rather than IT infrastructure. Attackers use deceptive ploys to create compelling behavioural and cosmetic hooks, which in turn lead a target to disclose sensitive information or to interact with a malicious payload. The creation of such hooks requires background information on targets. Individuals are increasingly releasing information about themselves online, particularly on social networks. Though existing research has demonstrated the social engineering risks posed by such open source intelligence, this has been accomplished either through resource-intensive manual analysis or via interactive information harvesting techniques. As manual analysis of large-scale online information is impractical, and interactive methods risk alerting the target, alternatives are desirable.
In this paper, we demonstrate that key information pertinent to social engineering attacks on organisations can be passively harvested on a large-scale in an automated fashion. We address two key problems. We demonstrate that it is possible to automatically identify employees of an organisation using only information which is visible to a remote attacker as a member of the public. Secondly, we show that, once identified, employee profiles can be linked across multiple online social networks to harvest additional information pertinent to successful social engineering attacks. We further demonstrate our approach through analysis of the social engineering attack surface of real critical infrastructure organisations. Based on our analysis we propose a set of countermeasures including an automated social engineering vulnerability scanner that organisations can use to analyse their exposure to potential social engineering attacks arising from open source intelligence.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
In this paper, we demonstrate that key information pertinent to social engineering attacks on organisations can be passively harvested on a large-scale in an automated fashion. We address two key problems. We demonstrate that it is possible to automatically identify employees of an organisation using only information which is visible to a remote attacker as a member of the public. Secondly, we show that, once identified, employee profiles can be linked across multiple online social networks to harvest additional information pertinent to successful social engineering attacks. We further demonstrate our approach through analysis of the social engineering attack surface of real critical infrastructure organisations. Based on our analysis we propose a set of countermeasures including an automated social engineering vulnerability scanner that organisations can use to analyse their exposure to potential social engineering attacks arising from open source intelligence.446. Hudson-Smith, Andrew; Hay, Duncan; Wilson, Duncan; Gray, Steven: The Little Book of Connected Environments and the Internet of Things. ImaginationLancaster, 0000, ISBN: 978-1-86220-358-7. (Type: Book | Abstract | Links | BibTeX) @book{bk-hudson-smith_little_2019,
title = {The Little Book of Connected Environments and the Internet of Things},
author = {Andrew Hudson-Smith and Duncan Hay and Duncan Wilson and Steven Gray},
url = {https://s3-eu-west-1.amazonaws.com/uclpetras/wp-content/uploads/2019/10/28145640/Little_Book_of_Connected_Environments.pdf},
isbn = {978-1-86220-358-7},
publisher = {ImaginationLancaster},
abstract = {Our Little Book of Connected Environments is about opening up the potential of Internet of Things (IoT) devices to provide information about our environment. From city-wide systems and the idea of the Smart City through to building-level management systems and the connected home, data is being joined up - connected. Via a series of case studies this book explores the wide array of possibilities, from environmental data (Shazam for Bats) through to connecting everyday devices in public park settings (Tales of the Park) and onwards to adding IoT into the Curriculum via the Internet of Schools.
The context and impact is wider than these case studies. Connected environments have the potential to change everything we know about not only our urban environments but also our homes, healthcare, transport, security and beyond. This little book builds on work carried out by a team of computer scientists, social scientists, environmental scientists and artists over the last decade, providing a glimpse into the potential of connected environments. We hope to show that how, in many ways, we are at the start of a new digital revolution of connected devices which will transform how we view, manage and use our environments. So, what does this Little Book tell you? We begin by clearly explaining what we mean by connected environments and the Internet of Things. After this, we go into a bit more depth, presenting a number of case studies which we believe illustrate the potential of these technologies to change our lives for the better…},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
The context and impact is wider than these case studies. Connected environments have the potential to change everything we know about not only our urban environments but also our homes, healthcare, transport, security and beyond. This little book builds on work carried out by a team of computer scientists, social scientists, environmental scientists and artists over the last decade, providing a glimpse into the potential of connected environments. We hope to show that how, in many ways, we are at the start of a new digital revolution of connected devices which will transform how we view, manage and use our environments. So, what does this Little Book tell you? We begin by clearly explaining what we mean by connected environments and the Internet of Things. After this, we go into a bit more depth, presenting a number of case studies which we believe illustrate the potential of these technologies to change our lives for the better…447. Anthi, Eirini; Ahmad, Shazaib; Rana, Omer; Theodorakopoulos, George; Burnap, Peter: EclipseIoT: A secure and adaptive hub for the Internet of Things. In: vol. 78, pp. 477–490, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-anthi_eclipseiot_2018,
title = {EclipseIoT: A secure and adaptive hub for the Internet of Things},
author = {Eirini Anthi and Shazaib Ahmad and Omer Rana and George Theodorakopoulos and Peter Burnap},
url = {https://doi.org/10.1016%2Fj.cose.2018.07.016},
doi = {10.1016/j.cose.2018.07.016},
volume = {78},
pages = {477--490},
publisher = {Elsevier BV},
abstract = {With the proliferation in the quantity and types of devices that may be included in an Internet of Things (IoT) ecosystem, particularly in the context of a smart home, it is essential to provide mechanisms to deal with the heterogeneity which such devices encompass. Variations can occur in data formats, frequency of operation, or type of communication protocols supported. The ability to support integration between sensors using a "hub" has become central to address many of these issues. The implementation of such a hub can provide both the ability to act as an aggregator for various sensors, and also limit an attacker's visibility into locally provisioned sensing capability. This paper introduces EclipseIoT, an adaptive hub which uses dynamically loadable add-on modules to communicate with diverse IoT devices, provides policy-based access control, limits exposure of local IoT devices through cloaking, and offers a canary-function based capability to monitor attack behaviours. Its architecture and implementation are discussed, along with its use within a smart home testbed consisting of commercially available devices such as Phillips Hue Bridge, Samsung Smart Things Hub, TP-Link Smart Plug, and TP-Link Smart Camera. The effectiveness of EclipseIoT is further evaluated by simulating various attacks such as Address Resolution Protocol (ARP) spoofing, Media Access Control (MAC) address spoofing, Man-In-The-Middle (MITM), port scanning, capturing handshakes, sniffing, and Denial of Service (DoS). It is demonstrated that direct attacks upon EclipseIoT components are mitigated due to the security techniques being used.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
448. Lesniewska, Feja; Ani, Uchenna P. Daniel; Watson, Jeremy Daniel McKendrick; Carr, Madeline: Policy Briefing: The Internet of Things in Ports: Six Key Security and Governance Challenges for the UK Background. 0000. (Type: report | Abstract | Links | BibTeX | Altmetric) @report{rep-lesniewska_policy_2019,
title = {Policy Briefing: The Internet of Things in Ports: Six Key Security and Governance Challenges for the UK Background},
author = {Feja Lesniewska and Uchenna P. Daniel Ani and Jeremy Daniel McKendrick Watson and Madeline Carr},
doi = {10.13140/RG.2.2.19155.20003},
institution = {University College London},
abstract = {This policy briefing is based on a Roundtable held at Gard UK Ltd, London on 8th March 2019. Participants, including representatives from academia, business, government and the insurance sector, came together to identify the challenges to creating a safe, secure, and sustainable digital port environment in the UK in line with the Maritime 2050: Navigating the Future strategic vision. This briefing is based on work funded by EPSRC and carried out by UCL STEaPP NIPC-ALIoTT collaborative projects under the PETRAS Cybersecurity of the IoT Hub.},
keywords = {},
pubstate = {published},
tppubtype = {report}
}
449. Bravo-Solorio, Sergio; Calderon, Felix; Li, Chang-Tsun; Nandi, Asoke K.: Fast fragile watermark embedding and iterative mechanism with high self-restoration performance. In: vol. 73, pp. 83–92, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-bravo-solorio_fast_2018,
title = {Fast fragile watermark embedding and iterative mechanism with high self-restoration performance},
author = {Sergio Bravo-Solorio and Felix Calderon and Chang-Tsun Li and Asoke K. Nandi},
url = {https://doi.org/10.1016%2Fj.dsp.2017.11.005},
doi = {10.1016/j.dsp.2017.11.005},
volume = {73},
pages = {83--92},
publisher = {Elsevier BV},
abstract = {This paper presents a new algorithm to reduce significantly the computational cost of one of the best methods with self-recovery capabilities in the fragile watermarking literature. This is achieved by generating two sequences of reference bits associated to the 5 most significant bit-planes (MSBPs) of the image. The reference bits and some authentication bits are then allocated to the 3 least significant bit-planes (LSBPs) of the image. The receiver uses the authentication bits to localise altered pixel-blocks and then executes an iterative restoration mechanism to calculate the original value of the watermarked pixels. Experimental results demonstrate that the embedding method executes significantly faster compared to the state-of-the-art method while achieving a high restoration performance.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
450. Alberts, Genevieve; Gurguc, Zeynep; Koutroumpis, Pantelis; Martin, Ralf; Muûls, Mirabelle; Napp, Tamaryn: Competition and norms: A self-defeating combination?. In: vol. 96, pp. 504–523, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-alberts_competition_2016,
title = {Competition and norms: A self-defeating combination?},
author = {Genevieve Alberts and Zeynep Gurguc and Pantelis Koutroumpis and Ralf Martin and Mirabelle Mu\^{u}ls and Tamaryn Napp},
url = {https://doi.org/10.1016%2Fj.enpol.2016.06.001},
doi = {10.1016/j.enpol.2016.06.001},
volume = {96},
pages = {504--523},
publisher = {Elsevier BV},
abstract = {This paper investigates the effects of information feedback mechanisms on electricity and heating usage at a student hall of residence in London. In a randomised control trial, we formulate different treatments such as feedback information and norms, as well as prize competition among subjects. We show that information and norms lead to a sharp - more than 20% - reduction in overall energy consumption. Because participants do not pay for their energy consumption this response cannot be driven by cost saving incentives. Interestingly, when combining feedback and norms with a prize competition for achieving low energy consumption, the reduction effect - while present initially - disappears in the long run. This could suggest that external rewards reduce and even destroy intrinsic motivation to change behaviour.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}